Sciweavers

1031 search results - page 129 / 207
» codes 2004
Sort
View
3DPVT
2004
IEEE
159views Visualization» more  3DPVT 2004»
15 years 2 months ago
Blind Watermarking of 3D Shapes using Localized Constraints
This paper develops a digital watermarking methodology for 3-D graphical objects defined by polygonal meshes. In watermarking or fingerprinting the aim is to embed a code in a giv...
Adrian G. Bors
ACMSE
2004
ACM
15 years 2 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ACSAC
2004
IEEE
15 years 2 months ago
.NET Security: Lessons Learned and Missed from Java
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
APSEC
2004
IEEE
15 years 2 months ago
Tool Supported Development of Service-Based Systems
Service-based systems engineering is a recent paradigm that has proven useful for the development of multifunctional systems, whose functions may be used in different contexts and...
Martin Deubler, Johannes Grünbauer, Gerhard P...
APSEC
2004
IEEE
15 years 2 months ago
Testing Java Interrupts and Timed Waits
Testing concurrent software is difficult due to problems with inherent non-determinism. In previous work, we have presented a method and tool support for the testing of concurrent...
Luke Wildman, Brad Long, Paul A. Strooper